Results for: passwords - Page 8

Suggested Categories:

Password Management Software
Password management software securely stores, generates, and manages passwords for users across various accounts and systems. It helps individuals and organizations maintain strong, unique passwords for each service while reducing the risk of password fatigue or breaches due to weak or reused passwords. These tools typically offer features like password vaults, automatic password generation, encryption, and multi-factor authentication (MFA) for added security. Password management software is essential in protecting sensitive information from cyber threats by simplifying and securing the process of handling numerous login credentials. For businesses, it also allows for centralized control and auditing of password access, ensuring compliance with security policies and regulations.
Password Policy Enforcement Software
Password policy enforcement software ensures that users create strong, secure passwords that comply with organizational security standards. It enforces rules such as minimum length, complexity, uniqueness, and expiration periods to reduce the risk of unauthorized access. The software can integrate with identity management systems, prompting users to update weak or expired passwords automatically. Advanced features may include real-time breach detection, password reuse prevention, and audit trails for compliance reporting. By promoting stronger authentication practices, it enhances overall cybersecurity and minimizes vulnerabilities from weak or compromised passwords.
Self-Service Password Reset (SSPR) Software
Self-service password reset (SSPR) software enables users to reset or recover their passwords without needing IT support, improving efficiency and reducing downtime. These platforms typically use security questions, email verification, two-factor authentication (2FA), or biometrics to authenticate users and ensure their identity before allowing them to reset their passwords. Self-service password reset software helps organizations reduce help desk workloads, minimize security risks associated with weak or forgotten passwords, and enhance user experience by providing a quick and secure way to regain access to accounts. By implementing this software, companies can improve security, streamline operations, and provide a more seamless user experience.

1236 Products for "passwords" with 1 filter applied:

  • 1
    Securden Unified PAM
    Discover and consolidate all privileged account credentials into a centralized repository. Regulate access to all critical IT assets. Grant just-in-time access, and enforce least privilege on devices in the organization. • Enforce remote password resets on devices. • Manage Windows domain, service, local admin accounts & their dependencies. • Eliminate hardcoded-credentials from scripts and configuration files. • Automate password access for non-human identities with APIs...
  • 2
    WinMagic MagicEndpoint
    ... authentication, addressing their cyber security needs, while eliminating password friction and reducing password management costs. MagicEndpoint addresses a growing industry need for precise, strong user authentication while still protecting the data security within devices, servers, and networks.
  • 3
    PureKeep

    PureKeep

    PureVPN

    Experience the ultimate online protection with PureVPN's turbo-fast VPN. Keep your online activities secure and private with our advanced VPN shield, perfect for iOS users who value their online privacy and need lightning-fast speeds. Trust in PureVPN to provide a secure and seamless online experience while protecting your digital identity. PureVPN not only provides a reliable and speedy connection for all your online needs but also doesn’t let third parties spy on you. You can enjoy super...
    Starting Price: $3.99 per month
  • 4
    KakaSoft USB Security
    Protect your files automatically after the USB disk plugs into a PC. Enjoy protection anytime and anyplace without installation. Lock and unlock USB drives on any computer without installation. USB Disk Security well protects your sensitive information in USB drives with the strongest encryption technique. Lock, encrypt, password password-protect USB flash drives, thumb drives, pen drives, memory sticks, and other portable storage devices. This USB disk security program ensures comprehensive...
    Starting Price: $14.95 per month
  • 5
    PortalGuard

    PortalGuard

    BIO-key International

    BIO-key PortalGuard IDaaS is a single, flexible cloud-based IAM platform that offers the widest range of options for multi-factor authentication, biometrics, single sign-on, and self-service password reset to support a customer’s security initiatives and deliver an optimized user experience – all at an affordable price point. For over 20 years, industries such as education, including over 200 institutions, healthcare, finance, and government have chosen PortalGuard as their preferred solution...
  • 6
    passbolt

    passbolt

    passbolt

    Finally, a password manager built for collaboration. Secure, flexible, and automation-ready. Trusted by 10,000 organizations, including Fortune 500 companies, newspapers, governments, and defense forces. Passbolt servers are designed to be simple to install and easy to manage. Yet they are enterprise-ready and can support complex setup for high availability. Passbolt can be used from your browser or mobile phone. Sharing happens in real-time. Desktop apps are coming soon. Retrieve, store...
    Starting Price: €45/month/10 users
  • 7
    Resurva

    Resurva

    Offshoot

    ... appointments. Set a favorite service and provider for quick appointment bookings. Prepay for appointments through Apple Pay. Manage their profile. Check and manage upcoming bookings. Add appointments to their calendar. Use the 1Password integration for password management. Select and add service options, fill out custom fields and agree to waivers. Switch location schedules with ease (for businesses with more than one location).
    Starting Price: $20.00/month
  • 8
    PHP Timeclock

    PHP Timeclock

    PHP Timeclock

    It is a simple yet effective web-based time clock system. It allows you to track all employee time as well as upcoming vacations and more, and it can replace manual sign-in/sign-out sheets. An administration piece is included which allows an administrator to add or delete users, change a user's time or password (if using passwords is enabled), and hide the reports from your users where only an admin or a reports user has access to them. These reports can be run to show daily activity...
  • 9
    miniDBA

    miniDBA

    miniDBA Software

    ... Windows user security gives you enough permission on the Sql Server being connected to then leave authentication as windows. If you need to use Sql Server authentication including name and password then choose that here. Note: passwords are encrypted by miniDBA using built in Windows encryption functions to ensure no sensitive data is held unencrypted by miniDBA.
    Starting Price: $99 one-time payment
  • 10
    Kirby Project Hub
    ... is optimized for desktop, tablet and mobile phone. The project pages can be password-protected. Client accounts are readily handled using the admin panel, a password is provided to all authorized users and unlimited projects can be attached per user.
  • 11
    Directory Burst

    Directory Burst

    Directory Burst

    Upload student information using our pre-built templates and publish your directory in minutes. Try us for free. If you like it, pay an affordable annual fee based on the size of your school. Provide unique, password-protected logins only to those permitted to see your directory. Allow parents to print individual classroom pages as needed but go online for everything else. Browse your directory by grade or classroom, or pinpoint specific individuals via search. Only those who you invite...
    Starting Price: $199 per year
  • 12
    east-tec InvisibleSecrets
    east-tec InvisibleSecrets is a powerful privacy suite that protects your files using a two-layered approach: military-grade encryption and steganography. While encryption secures your data, steganography goes further by hiding it inside harmless-looking files like images or web pages, so no one even knows it's there. The software also includes a secure password manager, an application locker to restrict access to programs, and a file shredder to permanently erase sensitive data. For easy...
    Starting Price: $29.95 one-time payment
  • 13
    Simple TimeClock

    Simple TimeClock

    BlockHead Ventures

    Simple Time Clock software, easy for employees to use and simple for employers to maintain. Check in and out with a single password entry. The current date and time is recorded to file ready for report. Time clock can be used by multiple employees, up to five hundred are supported. Manage all employee time sheets under one simple program. Add, edit, and report employee attendance with a few clicks. Print time sheet reports for any number of days. Password protect the Editor from unauthorized...
  • 14
    Active@ Boot Disk

    Active@ Boot Disk

    LSoft Technologies

    Active@ Boot Disk is a complete and functioning computer operating system on CD/DVD/USB disk. Boot Disk does not modify the operating system already installed on a computer's hard drive. It includes many tools to boot up a computer and fix most startup, PC configuration, and system management problems. Ability to start non-bootable PC to get exclusive access to the local disks and system. Boot Disk media may be removed from the system after successfully booting the system.Administrator password...
    Starting Price: $79.95 one-time payment
  • 15
    Mi-Token

    Mi-Token

    Mi-Token

    Multi-Factor Authentication or MFA is a process of determining whether a user is authorized to access a service, website, or an application. A simple username and password are now no longer considered to be effective by security experts. MFA utilizes secure credentials to greatly reduce the likelihood of a malicious attack or identity fraud. Mi-Token, with a one-time password (OTP) greatly improves the security associated with your login credentials, as it is valid for only one login session...
  • 16
    Veridium

    Veridium

    Veridium

    Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while...
  • 17
    Suelon

    Suelon

    Suelon

    Each member has a secure login to their account. The password may be changed or updated at any time by the member. The member can view all Suleon Loyalty Cards held for any number of merchants. As the system grows it is envisaged that members will have many options when they can shop using the Suelon technology and receive significant loyalty benefits. A full card history is available to the member by simply logging in using the chosen secure password. Details on every transaction, with each...
    Starting Price: $50 per month
  • 18
    pkhub

    pkhub

    Newtecnia Solutions

    No more SSH keys stored as local files on dev laptops. Access your servers securely and from anywhere. Access your servers, databases and api endpoints from your software and terminal securely and without having to worry about how to distribute, update and save your credentials. Access your servers, databases and api endpoints from your software and terminal securely and without having to worry about how to distribute, update and save your credentials. Share and distribute credentials...
  • 19
    Secure-PDF

    Secure-PDF

    ASCOMP Software

    The PDF format is used worldwide to distribute graphically processed documents. However, editing the documents is usually associated with high costs because good PDF editors are quite expensive. The cheaper alternatives on the other hand, lack the important functions to make PDFs secure, for example by encrypting, digitally signing or adding watermarks. Secure-PDF puts an end to this: Encrypt your own or other people's PDF documents with up to 256 bit key strength (AES). Add a password to open...
    Starting Price: $19
  • 20
    IT Portal

    IT Portal

    IT Portal

    The most flexible platform for KBs, Docs, Passwords, and Configurations running on our cloud or yours... Period! Your clients get online and offline access to their documentation. Also trusted by IT Departments around the world, not just MSPs. The IT Portal is used by over 2500 paying users. This count does not include our instances that are allowed unlimited users. Our cloud offering services regions including the US, CA, UK, EU, and AU. You can also run the portal in your private cloud...
    Starting Price: $25 per user per month
  • 21
    Hypergate Authenticator
    ... is otherwise not available. Hypergate is fast, not only when interacting with the User, also when implementing it. Enable your Users with Kerberos authentication by simply pushing Hypergate on their device. If there is an issue with the password of the user, this can be varied and changed by them directly on their device, without contacting IT staff for help (SSPR). No dependence on having to use a computer to reset the password. With Hypergate, you can allow staff to become truly mobile.
  • 22
    Page 2 Stage

    Page 2 Stage

    Page 2 Stage

    Page 2 Stage is now free. We no longer sell Page 2 Stage. However, you must still enter a username and password to unlock Page 2 Stage. Please enter the below username and password before you create any scripts, otherwise the scripts you create in demo mode will always be marked demo. Page 2 Stage is screenwriting software designed expressly for people writing screenplays, scripts, and plays. It provides numerous features needed by screenwriters not found in standard word processors. Written...
  • 23
    RdpGuard

    RdpGuard

    RdpGuard

    It monitors the logs on your server and detects failed logon attempts. If the number of failed logon attempts from a single IP address reaches a set limit, the attacker's IP address will be blocked for a specified period of time. Many Windows Server machines are under constant attack. Network scanners and RDP brute-force tools work 24/7. Eventually they may find a password to access your server! Moreover, RDP brute-force attacks abuse server resources (CPU, RAM, Disk Space and Network Bandwidth...
  • 24
    SendBig

    SendBig

    SendBig

    Share large files up to 30GB for Free. Dedicated German data centers & ISO Certified. We transfer and send large files online securely. To guarantee the safety and privacy of your data, we use SSL/TLS protocol (Secure Sockets Layer/Transport Layer Security). Files are stored in ISO 27001 certified data centers, an internationally recognized standard for information security. Sign up for Free to SendBig Pro to enjoy an amazing experience. End-to-end encryption, protect your files with password...
  • 25
    Encrypto

    Encrypto

    MacPaw

    Encrypto takes any file or folder and adds AES-256 encryption to it. With encryption, you know your file is incredibly secure and that only the right person can access it. Rather than relay a password to the recipient, include a unique, embedded password hint that only they would be able to decipher. Send encrypted files via email, Messages, AirDrop, Dropbox, carrier pigeon with USB stick — however you send them, your files are protected. With Encrypto, not only can you encrypt and share files...
  • 26
    SURFconext
    Let your users log in with 1 username and password to all cloud services your institution uses. Both for services that everyone uses and for services for small specialist teams. Secure, easy and privacy friendly. Find out what SURFconext can do for you as an institution, for your users and for service providers. SURFconext is open source and in full development. We offer information in various forms, such as webinars, blogs, and a Wiki. Or subscribe to the SURFconext newsletter for more news...
  • 27
    CompuTax

    CompuTax

    CompuTax

    Computation of Income & Tax thereon, taking care of various ceiling, deduction, set-off & carry forward of losses. Auto pick intimations & other communications etc. received on your email Id (sent by ITD) and their management. User registration & update profile contact. Direct navigation from one screen to other screen. Automatic transfer of master data and particulars to next assessment year(s). Facilities of creating user defined password for all clients & generating bulk password. Display...
  • 28
    Photoview

    Photoview

    Photoview

    ... files from a Nextcloud instance. Multiple users can be configured, each with their own directory of photos and videos. Each user is configured with a username and password, to keep their media private. Albums and individual photos or videos can easily be shared by generating a public or password-protected link. When photos are analyzed for EXIF metadata, this information is displayed next to the photo.
  • 29
    XYGATE Identity Connector
    Managing strong passwords and credentials is often a challenge. Ensuring they are stored properly, changed regularly, meet complexity and compliance requirements, and are auditable can be overwhelming to implement and manage. Current solutions for requesting and managing user access are outdated and inefficient. Processes are manual, complex, and don’t map to the core business initiatives driving change within the enterprise. Governance is often an afterthought, leaving many enterprises...
  • 30
    Maccy

    Maccy

    Maccy

    Unlike other Mac clipboard managers, Maccy does only one job - keep your copy history and let you access it fast. You won't be overloaded by unnecessary features. Maccy works blazingly fast. You can open and search your entire clipboard history in just a fraction of a second. Nothing should distract you from what you're focused on. Maccy respects your privacy. If your password manager removes a copied password from the clipboard, so will Maccy. Everything is stored on your computer. Maccy...